Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Cloud Computing

The Smart Cloud – Microsoft Wants to Streamline AI Adoption

By Kayla Matthews | May 17, 2017

Microsoft Streamline AI Adoption Artificial intelligence, or AI, has begun to see incorporation into more and more of the technologies we use every day. What not too long ago seemed like a futuristic fantasy has become a reality. Although the…

Countdown to GDPR: Preparing for Global Data Privacy Reform

By Daren Glenister | May 17, 2017

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European Union’s General Data Protection Regulation (GDPR) are in for a rude awakening when 2018 rolls around. It’s not enough for…

New Frost & Sullivan Webinar: Connected Cars: Where are the Services?

By CloudBuzz | May 17, 2017

Frost & Sullivan Webinar WHEN: 1st June, at 4pm BST WHERE: Online, with complimentary registration. Please email: SPEAKERS: Jean-Noël Georges, Global Programme Director, Digital Transformation, Frost & Sullivan; Julien Clausse, Head of Moonshot Innovation, Amadeus; Christine Caviglioli, Senior Vice President…

How Machine Learning is Revolutionizing Digital Enterprises

By Ronald van Loon | May 16, 2017

Machine Learning is Revolutionizing Digital Enterprises According to the prediction of IDC Futurescapes, Two-thirds of Global 2000 Enterprises CEOs will center their corporate strategy on digital transformation. A major part of the strategy should include machine-learning (ML) solutions. The implementation…

WannaCry North Korea Ransomware Attack

The WannaCry Ransomware is a Reminder to Get Serious About Security

By Jeremy Daniel | May 16, 2017

WannaCry Ransomware Attack Ransomware is the word on everyone’s lips this week, following the massive WannaCry ransomware attack which spread quickly all over the world. Security experts estimate that over 200 000 systems across 150 countries were affected by the…

Hewlett Packard Enterprise reveals powerful computer prototype

By CloudBuzz | May 16, 2017

Hewlett Packard Enterprise Co on Tuesday unveiled a new computer prototype that it said could handle more data than any similar system in the world. The Palo Alto, California-based company said the prototype contains 160 terabytes of memory, capable of…

Bryan Doerr

Can You Afford the Risk of Not Going to the Cloud?

By Bryan Doerr | May 16, 2017

Risk of Not Going to the Cloud If you’re considering a migration to a public cloud environment, you’re most likely motivated by the potential to reduce costs, while increasing capital efficiency, productivity, agility, and overall scalability. Yet with so much…

2017 Top Ten European Cloud Service Providers Report

By CloudBuzz | May 16, 2017

2017 Top Ten European Cloud Service Providers BOSTON, May 16, 2017— Cloud Spectator, the industry leading Infrastructure-as-a-Service (IaaS) Performance Benchmarking agency, today released its 2017 Top Ten European Cloud Service Providers Report, with OVH achieving the highest CloudSpecs Score™ in…

Cryptographic Key Generation – It’s Time To Pay Attention

By Richard Moulds | May 15, 2017

Cryptographic Key Generation When we think about cryptographic keys, we tend to think about closely guarded secrets. Keys are the only thing that keeps the attacker away from your encrypted data. Some keys are usually treated with the appropriate level of…

Identity theft survey results: Consumers need more education and help

By CloudBuzz | May 15, 2017

COSTA MESA, Calif., May 15, 2017 /PRNewswire/ — News of data breaches and the risks of identity theft and fraud persist, but consumers’ vigilance and awareness haven’t kept pace. A national survey by Experian, the world’s leading global information services…

malware tracking maps

Live Hacking and Ransomware Tracking Maps Online

By CloudTweaks | May 14, 2017

Hacking and Ransomware Tracking Maps We’ve recently covered a few live hacking maps but have decided to extend the list based on the recent ransomware activities with some additional Hacking and Ransomware Tracking Maps. Ransomware refers to malicious software that blocks access…

Customers Rapidly Adopting Oracle’s New Security Cloud Services

By CloudBuzz | May 12, 2017

REDWOOD SHORES, Calif., May 12, 2017 /PRNewswire/ — Oracle today announced that Oracle’s Identity-based, Security Operations Center (SOC) cloud services portfolio is experiencing exceptional growth, well surpassing 1 million users since its launch just six months ago. Oracle’s Identity SOC framework…

Follow the Lead: 5 Data Security Tips Small Businesses Should Mimic From Larger Enterprises

By Loren Baker | May 12, 2017

Data Security Tips Small Businesses Should Mimic As more and more companies begin to switch to the cloud, cyber attacks need to be a top priority for business owners of all sizes and within all industries. But small businesses in…

Uh – Oh! Is This the Year of the Tipping Point for You?

By John Pientka | May 11, 2017

Cloud Tipping Point One survey says most workloads are still in on-premise data centers. Another analysis says it’s all going to the cloud. Are we at a tipping point? If so, better get ready. “The tipping point is that magic…

robo banking

2 Fastest Growing Areas – Fintech Banking And Investment Services

By Jennifer Klostermann | May 11, 2017

Fintech Banking And Investment Services Knowingly or not, we’re all constantly leaving massive data trails behind us, many of which are linked to our finances. From credit card payments to online orders to mobile bill splitting, the range of fintech applications…

Rubicon Labs Showcases IoT Identity Platform at Internet of Things World in Santa Clara, CA

By CloudBuzz | May 11, 2017

Rubicon Labs Showcases IoT Identity Platform Product Demonstration to Highlight Rubicon’s Cloud-to-Device Identity Platform for Authenticating Devices and Providing Policy Enforcement and IoT Services to Industrial, Smart Buildings/Cities, Healthcare, and Agricultural Markets SAN FRANCISCO, CA–(Marketwired – May 11, 2017) –…

6 Blockchain Applications That Any Small Business Owner Can Use

By Loren Baker | May 10, 2017

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it could be particularly appealing to small business owners who are in need of affordable and secure ways to transfer and…

Open APIs Alone Won’t Change Banking

By CloudTweaks | May 10, 2017

Open Banking API’s Most people think of banks as one monolithic entity, but they are actually made up of hundreds of independent, pseudo-integrated systems. When a bank wants to make any kind of change, it has to conduct regression testing…

EU to tackle complaints over unfair trading practices by tech companies

By CloudBuzz | May 10, 2017

The European Union executive is planning a law to target unfair practices by leading online players such as Apple (AAPL.O) and Google (GOOGL.O) that smaller European competitors say is an abuse of their market positions. The European Commission said on…

Federal Cyber Pros Surveyed in Largest Known Workforce Study to Date

By CloudBuzz | May 9, 2017

WASHINGTON, May 9, 2017 /PRNewswire-USNewswire/ — According to the Center for Cyber Safety and Education™ Global Information Security Workforce Study (GISWS), sponsored by (ISC)²®, Booz Allen Hamilton and Alta Associates, federal agencies need to invest strategically and heavily in their…

POPULAR

Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) ...
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing ...
Research Report: Emergency Management Leaders Discuss the Security of Mobile, Remote Workers

Research Report: Emergency Management Leaders Discuss the Security of Mobile, Remote Workers

The Security of Mobile, Remote Workers Everbridge, Inc., a global software company that provides critical event management and enterprise safety ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” ...
Meet GRAIL - Fighting Cancer with Big Data, AI and the Cloud

Meet GRAIL – Fighting Cancer with Big Data, AI and the Cloud

Improve Your Chances of Surviving Cancer by 5X to 10X How would you like to improve your odds of surviving ...
4 MONETIZATION MODELS FOR THE DIGITAL BUSINESS ERA

4 MONETIZATION MODELS FOR THE DIGITAL BUSINESS ERA

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years ...
Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker (CASB) Cloud is the new address for businesses nowadays. The number of applications, hosted on the ...